Thursday, December 14, 2017
Home Tags Windows

Tag: Windows

Federal government security experts are increasingly uneasy about the threats to law enforcement from using older versions of the mobile OS. August 26, 2013 9:42 AM PDT The FBI and the Department of Homeland Security are increasingly aware of t...
There are at least two new Windows ARM tablets in the pipeline: The Microsoft Surface 2 and Nokia 'Sirius,' according to evolving rumors.
Word is Microsoft has released Windows 8.1 to manufacturing.

There's still no indication that developers or users are going to get the gold bits before October 18.
A director from the Stanford Center for Internet and Society sits down to dinner with NSA Director Keith Alexander to talk about leaked documents and government spying. August 22, 2013 4:58 PM PDT NSA Director Keith Alexander gives a talk during...
The German government doles out common-sense advice on using Windows 8 and TPM 2.0 chips in conjunction, but it's distorted by some observers into wild claims of "back doors." The German government on Thursday publicly denied a German newspaper report...
Lenovo will be preloading a Start Menu plus a new app store from SweetLabs on PCs and laptops, including its Idea and ThinkPad lines.
How much does it cost to patch 25 flaws in an open-source Web browser? Google is updating the stable version of its Chrome browser to version 29.0.1547.57 across the Windows, Mac and Linux operating system platforms.

The new update includes at least 25 security fixes as well as an improved Omnibox search capability and a new browser reset feature. In any given Google Chrome update, Google credits and rewards multiple researchers for their contributions to Chrome security. With the Chrome 29.0.1547.57 release, Google is crediting only four researchers for the discovery of six flaws. Three of those flaws were discovered by a single researcher, working under the alias "cloudfuzzer." In total, Google awarded $6,174 in reward money to the four researchers, with cloudfuzzer pocketing $3,000 of that total. Google recently revealed that it has paid out over $2 million in bug bounties to security researchers since 2010. So what did cloudfuzzer find to earn $3,000? cloudfuzzer reported three separate use-after-free errors in Chrome that affect Extensible Stylesheet Language Transformation (XLST), media elements and document parsing. Use-after-free errors occur when allocated memory that is no longer in use is still available as legitimate memory space for an attacker to use to launch an attack. Google is often able to find use-after-free flaws with its own security resources by way of its open-source Address Sanitizer tool. Security researcher Krystian Bigaj was awarded $1,337 for reporting an incomplete path sanitization issue, while Alex Chapman was awarded the same amount for an integer overflow issue. Christian Jaeger was awarded $500 for reporting an information leak issue related to overly broad permissions on shared memory files. Looking deeper into the Chrome 29 security fixes, Google's own team spent time on a number of memory hardening initiatives to further improve the security posture of the browser. Omnibox Security isn't the only thing that has been updated in the Chrome 29.0.1547.57 stable release. Google is getting back to its core roots with improved search capabilities by way of the Chrome Omnibox. Instead of a separate search window in the browser, Chrome users input Website addresses as well as search queries all in the Omnibox bar of the browser. With Chrome 29.0.1547.57, Google is promising that Omnibox suggestions will be improved, delivering better relevancy based on user browser behavior and history. Google offers its Chrome users lots of options for customization, which can sometimes lead users down a path they'd like to forget.

For those users, Chrome 29.0.1547.57 now enables them to reset all their browser settings to the original defaults. In addition to the stable update, Google has also updated its Dev channel early adopter edition to version 30.0.1599.14, providing multiple stability updates.

And Chrome Beta for Android is being updated to version 29.0.1547.58, giving mobile users a number of bug fixes. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist. ${QSComments.incrementNestedCommentsCounter()} {{if QSComments.checkCommentsDepth()}} {{if _childComments}}
The main innovations included in Panda’s 2014 Retail range of solutions include multi-platform protection offered by Panda Global Protection 2014. Cloud security specialist Panda Security announced the availability of a range of retail solutions for a variety of operating systems, including Panda Global Protection 2014, Panda Internet Security 2014 and Panda Antivirus Pro 2014. The main innovations included in Panda Security’s 2014 Retail range of solutions include multi-platform protection offered by Panda Global Protection 2014 for Windows, including XP, Vista, Windows 7 and Windows 8, Mac, including Apple’s mobile devices such as the iPad, iPhone and iPhone Touch, and Android devices, such as tablets, smartphones and even smart TVs. The solutions, built on Panda’s Collective Intelligence system, is designed to provide protection from viruses, hackers, online fraud and identity theft, in addition to known and unknown threats, with minimum impact on PC performance. "During the first six months of the year, 17 percent more malware samples were created than in the same period last year, so the situation is not just dangerous but also the degree of danger is increasing every month," Luis Corrons, technical director of PandaLabs at Panda Security, said in a statement. "Recently, Panda Security has noticed a gradual increase in attacks on mobile platforms, although there are significantly fewer than those against PCs. In any case, Android has become cyber-crooks’ preferred mobile operating system. Furthermore, there are more and more Trojans and malware in general that take advantage of these types of devices to infect PCs when they connect to them." The 2014 edition of both Internet Security and Antivirus Pro boost their capabilities against viruses, hackers and other threats. In addition to these features, Internet Security 2014 also provides options to protect the family, the user’s identify and user data through parental control, remote access, removal of spam and backup with file restore, and other features. The identity protection, anti-spam, parental control, backup, remote access, optimization, file encryption and password management modules have also been optimized.

Antivirus Pro also provides rapid and intuitive protection and includes a firewall, virtual keyboard, home network management, a rescue kit and multimedia options, and other features. Earlier this month, the company unveiled an updated version of its Cloud Systems Management (PCSM) platform aimed at Apple’s mobile iOS and designed to respond to the organizational needs presented by the increasingly popular bring-your-own-device (BYOD) trend in companies.

The latest version of the remote management and monitoring solution enables companies’ technical departments to rapidly and flexibly respond to incidents from their iPhones or iPads, in addition to diagnosing problems and implementing actions. Many businesses possess an unrealistic confidence surrounding the security of their networks, with more than 65 percent of IT/security professionals contacted for a survey by network visibility and security intelligence specialist Landcope not thinking or being unsure that they had experienced any security incidents within the last 12 to 18 months.

Areas of blind spots within the typical enterprise are many, including applications, network traffic, network devices, user activity, virtualized appliances and data centers, to name a few. ${QSComments.incrementNestedCommentsCounter()} {{if QSComments.checkCommentsDepth()}} {{if _childComments}}
Technology in the NHS has been a touchy subject in recent years.

The failed National Programme for IT (NPfIT) saw billions of pounds wasted and new plans have received mixed responses from staff and users alike. However, this hasn’t stopped a number of leading organisations from embracing what new technology can bring to the health service in the UK and being innovative with the tools available. One such Trust is University College London Hospital (UCLH). James Thomas, director of ICT at UCLH, has been driving his organisation towards embracing mobile and, in the past four years, has seen some great results. “I think we have been moving at this pace since around 2009,” he explains. “That year we wrote our scenario-based vision for 2013 to drive technology for that journey. In 2012, we opened the Macmillan Cancer Centre and it all became a reality, with patient portals, self check-in, mobile devices, real-time scheduling.

All our aspiring led to us delivering on that.” Mobile developments The hospital uses an outsourcing model, partnering mainly with Logica to choose where to go. However, when it comes to unified communications, it has teamed up with Azzurri Communications to push forward its mobile agenda. We had two BlackBerry failures within just two to three months of each other and as a 24/7 acute hospital, that is a lot of our important infrastructure affected  James Thomas, director of ICT at UCLH “Probably about 18 months ago, we were BlackBerry only,” says Thomas. “It was an internal enterprise purchase and one we had stayed with for some time. But then we had two BlackBerry failures in just two or three months of each other and, as a 24/7 acute hospital, that is a lot of our important infrastructure affected.” But it wasn’t just past events that inspired the director to look towards new platforms. “I was at a Gartner event and the speaker asked the audience who was using BlackBerry Enterprise Server,” he continues. “Unsurprisingly two thirds of the audience put their hands up.” “However, when he asked who intended to be using it in the future, a mere 25% raised their hands. I found this quite startling and along with the concerns I already had with BlackBerry, I knew we had to diversify.” Thomas and his team began to look at the other mobile options out there, with a keen focus on security which was what had led them to stay with BlackBerry for so long. “All the indications pointed towards Apple’s iOS as the first step so internally we brought in iPhone 4G and 4GS, alongside mobile device management (MDM) from Mobile Iron to provide that same level of security.” Trends in healthcare IT But as well as devices, more options were opened up to the hospital through the new MDM deployment. “At the same time we began to investigate mobile applications which are enormous in health right now,” says Thomas. “Mobile Iron gave us the launch pad to explore Bring Your Own Device (BYOD), deploy profiles onto mobile devices and to create mobile app stores to be used and validated internally.” Although smartphones were the first move, it quickly became clear staff wanted tablets as well to give them even more choice. “We have 8,000 employees, including a large community of consultants who also work in their own private practices,” he says. “These are affluent people who would purchase iPads for use outside of the trust as well as internally.” The IT team knew what devices were needed so next it was time to look at what sort of apps would be beneficial to the organisation. It split into three areas – clinical, non-clinical and patients – and then looked at what apps they would want to use. “For non-clinical they wanted apps such as email access and procurement; clinical were wanting data depositories and scheduling systems; and then patients want to be able to access public Wi-Fi for their own apps; but we also wanted to get feedback from them when they are at the hospital,” says Thomas. “The result of this drove functionality, the ability to cater for different platforms and the whole BYOD project kicked in.

Also, we were now able to look at internal app development and some of these projects have enabled us to unlock legacy systems.” One example was UCLH’s core PAS system.

The hospital developed a web services layer to deploy over the top so something like discharging a patient could be wrapped into a mobile app. The future of mobile at UCLH UCLH is still using BlackBerry, although it hasn’t purchased anything from the firm for the last 18 months and now has a number of iOS devices, but is still hesitant about the other mobile operating systems available. “We have looked at Android twice and both times we have found we just cannot secure it enough for our environment,” says Thomas. “The next device type we would be looking to adopt would more likely be Windows mobiles as there is a lot more enterprise capabilities. “From the enterprise perspective it makes sense to go through BlackBerry, iOS and then have Windows next in line but it is not what people are buying. No-one is knocking the door down and asking for Windows compatibility. We just need to see if it takes off. We aren’t ruling Android out for the future but we don’t want to dilute security.” Mixed reaction to new technology Although very pleased with how the roll-out of these new technologies have gone, Thomas admits there had been mixed reactions from staff. “With 8,000 employees, ranging from world class consultants to minimally paid administration staff, there has been a whole diversity of experiences and responses,” he says.  “Some have been very positive and enthusiastic, saying how liberating it is, allowing them to choose how to do their jobs and do work where they want to. However, some institutions have been a little slower in embracing it.” We aren’t ruling Android out for the future but we don’t want to dilute security “Nursing colleges, for example, have said BYOD is a way for nurses to subsidise the NHS, paying for their own devices rather than being provided them. But this has not been the view of the nurses we talk to.

If they need a smartphone or tablet for work and it can be justified we will buy them one, but many like to supplement this with the one they have got personally.” A future of apps at UCLH The trust is already looking to the future, having written its next mission statement on the vision for 2017 early last year. Mobile is again at the centre and Thomas wants to continue to build on the progress his team has made when it comes to apps.   “One example is in the way we manage new drugs being released into the trust and deciding whether to use them,” he says. “In the 2017 vision, this will be an advisory board app to make the decision.

There are more than 5,500 clinical apps available now and we want to be part of this revolution.” And it seems the director has been so impressed with the Mobile Iron solution, the supplier is likely to be involved for some time to come.   “We picked Mobile Iron to start with and did the pilot when it still only had a small footprint in the UK,” continues Thomas. “The small pilot we did was hugely successful at that point so we decided to invest more.” “We now have it so it is highly resilient, driving it out to more users and it has delivered everything it has promised. It is now part of our enterprise infrastructure and will remain so until at least our contract comes up in 2015.” Public sector collaboration Thomas is not just positive about his own trust’s future though and has key roles in a number of organisations in the capital, such as the London CIO Council, London Procurement Partnership and London Connect, so the public sector can share its experiences with technology and learn from one another. He concludes: “The IT agenda in the NHS has a bad public press following NPfIT, which was fundamentally flawed because it assumed every trust was starting from the same place and needed the same solution.

A cohort of us disagreed and carried on regardless of NPfIT.” “Now we live in a more open, collaborative world and, as long as we continue to recognise we are not all the same but we can help each other, we will get more of this innovation.” Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners.

If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com This was first published in August 2013
Microsoft warns that security exploits will spread like wildfire when support for its long-lived OS ends April 8, 2014. Come April 2014, organizations that are still running Windows XP will face not only a suppo...
Microsoft's latest tack in trying to wean users off Windows XP is to warn them of a possible 'zero day forever' scenario in the post-April 2014 support cut-off world.
Nokia might be launching a Windows RT-based tablet and a Windows Phone OS-based phablet before the end of this year, if rumors are right.